查询词典 encrypt
- 与 encrypt 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
One instance out of many is in the transferring process of the aglet. In this paper, we aim at the limitation in transfer to encrypt aglet with Cryptix3.2 algorithms library and accomplish the security transfer of aglet.
而本文就是针对这一缺陷对于Aglet在传输过程中存在的安全隐患用Cryptix3.2加密算法库进行了加密保护,实现移动Agent的安全传输。
-
I could encrypt it or alternately I could have fun.
我可以加密,或交替我能得到乐趣。
-
This article firstly analyse the conception and related technology of MEC, the architechure of Wireless Application Protocol cluster and application programming model. And deeply research for its security credit system, including encrypt arithmetic, Public Key Infrastructure theory, Wireless PKI technology and so on.
本文首先分析了移动电子商务的概念和相关技术,WAP协议簇的体系结构和应用编程模型,并对其安全信用体系进行了较为深入的研究,包括加密算法、PKI原理、WPKI技术等方面。
-
To achieve security in the networks, it is important to be able to encrypt and authenticate messages sent between the users.
为了实现网络安全,一个重要的方法是网络用户传送加密和可鉴定的消息。
-
An encryption method based on ECC is applied on the MPEG system directly. The encryption method isnt considered the characteristic of the video signal, regard the image data file as the general binary scale data file to encrypt.
论文最后采用了置乱算法的加密思想,考虑到MPEG-2视频结构中P帧和B帧中运动向量计算的特点,提出了一种基于混沌理论的视频加密算法。
-
If you want, you can encrypt the binary content.
如果您愿意,您可以加密的二进制内容。
-
To encrypt the GPS information, 128 bit AES arithmetic was used.
采用128bit密钥长度的AES算法对定位信息加密。
-
In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.
本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。
-
At last,a preliminary visual 3D model system for coal seam is established based on coal seem 3D model and using OpenGL and Vc~6.0.Currently a part of research results has been applied to Mine Survey Geological Information System(MSGIS3.0),including constrained triangulation of coal bed suface, coal bed scaleboard contours with fault,part encrypt of contours,excellent turn of triangle,space encrypt,any direction profile of coal bed and so on.
论文的部分研究成果已经应用于煤矿地质测量空间信息系统MSGIS3.0中,主要表现为通过煤层底板表面的约束三角剖分,实现了煤层底板等高线的断层处理、等高线的局部加密、三角形优化、空间插值、任意切割煤层剖面等方面。
-
ULTRA File Encrypt is the ideal way to professional encryption from all types of files with a password. Simple and Clear interface.
ULTRA File Encrypt 是一个理想的专业加密工具,可以用口令对各种类型的文件进行加密。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。